Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and device for preventing phishing attacks

A technology for phishing attacks and phishing websites, applied in the field of communication, can solve problems such as interference data, long time consumption, high cost, etc., and achieve the effect of preventing phishing attacks, reducing resource consumption and processing time

Active Publication Date: 2013-12-04
CHENGDU HUAWEI TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example: there are 2,000 pairs of users and passwords in the database. Through the "diluted" service plan, only 2 accounts and passwords are true, and it is difficult for phishers to extract the real account and password.
[0004] The inventor found that the method for preventing phishing websites in the prior art, by letting the ISP close the website, takes a long time and requires a relatively high cost
However, through the "dilution" service plan, in order to achieve the purpose of effectively interfering with data, it is necessary to continuously send false information. This process is time-consuming and resource-consuming, and cannot effectively prevent phishing websites.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for preventing phishing attacks
  • Method and device for preventing phishing attacks
  • Method and device for preventing phishing attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0027] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0028] A method for preventing phishing attacks is provided in the embodiment of the present invention, such as figure 1 As shown, the method includes:

[0029] Step 101, receiving the login information and client identification sent by the client;

[0030] Wherein, the login information in this step can include information such ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a method and device for preventing phishing attacks. The method comprises the following steps: receiving login information and client-side identifications sent by a client-side; judging whether the client-side is recorded in a black list in accordance with the client-side identifications; when the client-side is recorded in the black list, blocking the client-side to log in; when the client-side is not recorded in the black list, judging whether the login information belongs to bait information, wherein the bait information is used for interfering login information of a phishing attack client-side to log in; when the login information does not belong to the bait information, allowing the client-side to log in; and when the login information belongs to the bait information, recording the client-side to the black list and blocking the client-side to log in, thus reaching the purpose of preventing the phishing attacks, and reducing resource loss and processing time at the same time.

Description

technical field [0001] The invention relates to the communication field, in particular to a method and device for preventing phishing attacks. Background technique [0002] With the rapid development of Internet technology and the increasing frequency of network transactions, phishing attacks are also showing an explosive upward trend. This year, phishing attacks have attracted the close attention of major e-commerce organizations, banks, security vendors, etc., and some phishing attack protection, monitoring solutions, and corresponding products have emerged. At present, the main way to prevent phishing websites is through the browser of the client. effective blocking. [0003] How to effectively block phishing attacks belongs to the problem that anti-phishing technology needs to solve. At present, the commonly used method of blocking phishing attacks is the ISP (Internet Service Provider, Internet Service Provider) shutdown scheme. The main process is: the detected phishi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 马勺布关海南
Owner CHENGDU HUAWEI TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products